We have updated our Cookie Policy to reflect changes in the law on cookies used on websites in Europe. This website uses cookies to maximize your experience and help us to understand how we can improve it. To find out more click here.

Cookies are text files containing small amounts of data which are downloaded to your computer, or other device, when you visit a website. Cookies allow us to recognize your computer and improve your experience on our website. Some cookies are also necessary for the technical operation of our website. Please read our Cookie Policy which provides important information about the cookies we use, how we use them and how they can be deleted. Please remember that deleting cookies may affect your experience of our website.

The Internet of Things are impacting businesses in ways that may not be anticipated. While communications from devices can provide valuable insights into consumer behavior and bring cost-saving efficiencies to businesses, those same communications raise legal and compliance issues in the privacy and employee relations spheres.

6/3/2014Cybersecurity as a ServiceIncreasingly, companies are looking at cybersecurity practices and operating models to better understand the best practices they should implement to manage cybersecurity more holistically. Rather than handling cybersecurity in a piecemeal fashion and focusing more on response to incidents, more attention should be paid to prevention.

This webinar by Pillsbury partner John Barton, will provide practical information to help merchants, banks, card issuers, acquirers and other companies understand and effectively negotiate card processing agreements.

Why do you need to act urgently even if you feel your data handling is compliant? 2013 has already seen the frenetic pace of change from last year continue regarding new data laws and fines that will affect how all companies use data. The European Union is planning to dramatically amend its EU Data Protection Directive with a new Regulation. This will tackle recent developments in social media, marketing, mobile apps and cloud computing as well as deal with a perceived serious lack of compliance thus far. New major fines are starting to be imposed. This, along with the new Binding Corporate Rules (BCRs) for data processors that took effect on 1 January 2013, are just some of the recent changes businesses need to consider now.

Cloud computing has quickly become one of the hottest topics in technology with its promise of economic efficiency, ease of use and flexibility of storage for an ever-mounting quantity of data. Along with the many desirable traits it brings, however, are also legal, privacy and data security issues companies should consider.

The International Technology Law Association (ITechLaw) annual conference is an excellent opportunity for professionals in the industry to have the chance to discuss the newest cutting-edge technologies and legal developments in one of the world’s most historic cities. James Gatto is presenting "Gamblification"! Legal Issues Relating to the use of Gambling Mechanics for Non-Gambling Purposes.”

Nora Burke and James Chudy presented "Taxing New Laws and Regulations: Punishing the Good Guys?"

Pillsbury Sponsored

12/13/2011Are You Ready? California Transparency in Supply Chain Act of 2010Webinar Join us to discuss the new California Transparency in Supply Chain Act of 2010. This new law takes effect on January 1, 2012. It requires certain retailer sellers and manufacturers doing business in California and having annual worldwide gross receipts that exceed $100,000,000 to publicly disclose their policies and procedures for their direct supply chains in connection with efforts to eradicate human trafficking and slavery.

Pillsbury Sponsored

12/7/2011Social Gaming and Virtual Goods World 2011Grange Tower Bridge Hotel Social Gaming & Virtual Goods World will bring together social game developers and global brands with social networking platforms, virtual currency platforms, social advertising platforms and social gaming technology to understand how to create, distribute, monetise, and gamify social games.

10/20/2011 - 10/21/2011SOCIALIZE West - Monetizing Social MediaMission Bay Conference Center
Following the overwhelming success of the inaugural event in New York, Socialize West unites business leaders in gaming, virtual goods, mobile, marketing, and media for two days of learning, connecting, and sharing about all things social. Attendees come to Socialize for the real-world insight that our unique blend of industry heavyweights, business visionaries and results-oriented practitioners bring to the table. Through two days of comprehensive sessions, focused discussion and diverse perspectives, you'll learn how all the social media pieces fit together to create a unified business strategy.

Pillsbury Participating

10/10/2011 - 10/13/2011The Game Developers Conference® Online 2011Austin Convention Center The Game Developers Conference® Online (GDC Online) returns to Austin, TX for four days to serve as the community meeting point and source of learning, networking and inspiration for developers and business professionals in the sphere of connected gaming. You'll find nearly 150 lectures, 8 specialized summits and tutorials, over 200 speakers, a bustling expo floor and numerous networking and social events to ensure that you stay current in today's marketplace of online, cloud and connected gaming.

Join hundreds of digital executives, senior marketers, entrepreneurs, web strategists, bloggers, and investors at the Second Annual Digital East for expert content on opportunities and trends created by the latest in web innovation. Hear from dozens of industry thought leaders and innovators on topics such as Social Media, Mobile, Cloud, Analytics, Big Data, Search, Online Advertising, Ecommerce, Email and much more!

The Security Standard: Securing the Enterprise from a Dangerous Cyberworld will address the daunting challenges that today's information security executives face, such as new advanced persistent threats, rapidly emerging consumer devices, continued cloud adoption and getting your arms around governance, risk management and compliance.

Pillsbury Participating

5/24/2011The 2011 Outsourcing Tools & Technology Symposium - EastMicrosoft NYC Briefing Center Robert Zahler and Doug Parker will speak at the International Association of Outsourcing Professional's (IAOP) 2011 Outsourcing Tools & Technology Symposium - East on Tuesday, May 24, 2011 in New York City, with Al Crew, Director, Strategic Sourcing from CIGNA. Their session, "Power Tools for Thorny Problems," will focus on three tools used by Pillsbury Global Sourcing and its clients to aid the sourcing process: ValueChain, CostMarking and RetainedSolution.

Joshua Konvisser will be presenting on bankruptcy issues in outsourcing at PLI's Outsourcing 2010: Structuring, Negotiation and Governance program in New York City on Tuesday, November 2, 2010. Mr. Konvisser and his co-presenter, Laurie Hane, will touch on the following topics: what every sourcing lawyer should know about bankruptcy law, practical tips for customers and supplier for reducing exposure, Section 365(n) and IP rights issues and software escrows.

Pillsbury Participating

4/15/2010 - 4/16/2010Information Technology Law Institute 2010: Opportunities in Cloud Computing, Blogs, Brand Protection and Targeted MarketingPLI California Center In an era of economic recovery, technology will provide exciting avenues for business growth and development. New technology will provide a competitive advantage to innovators who understand the potential business opportunities. Some of these cutting edge opportunities include mobile financial transactions, mobile entertainment, cloud computing, behavioral marketing and intellectual property monetization. This is a program for those who must keep up with the latest advances in technology and how they may affect your clients and your practice. Pillsbury attorney Cydney Tune will be speaking at the event. Ms. Tune will be discussing Issues in Mobile Transactions; Special business issues for technology transactions: Tips for maximizing value; Critical issues and strategies in licensing; Trademark and copyright related licensing transactions; Data protection in the mobile environment; and Special issues for international information technology licensing transactions.

10/29/2009Privacy Issues in a Multi-Jurisdictional Legal Environment: What Works (and What Doesn't)Webinar There are a number different approaches -- Safe Harbor, Model Contracts and Binding Corporate Rules to name a few -- for companies operating in multiple jurisdictions to manage privacy policies and procedures. But in a world where the laws and regulations may vastly differ (and perhaps conflict) from one jurisdiction to another, how practical are these approaches for companies? What is a global company's best path among the varying privacy regulations?

John Hane, Counsel in Pillsbury's Communications practice, will participate in the 2009 Annual Conference presented by the Silicon Valley-China Wireless Technology Association. Mr. Hane is a panelist discussing "Smart Grid: The Next Frontier of the Mobile/Wireless EcoSystem."

$4 billion of stimulus money will soon flow to the smart grid industry via the Department of Energy's Smart Grid Investment Grant Program and Smart Grid Demonstration Program. Through these programs, the federal government will kick start the modernization of the nation's electric grid to accommodate renewable power, consumer energy efficiency programs and other measures, while improving the reliability and security of the grid. Companies that wish to conduct business in this space will find themselves working in a regulated industry, often with utilities, and may need to partner with large technology providers to deliver comprehensive solutions. The business drivers, commercial practices and decision making processes in the utility industry are very different from those in the high-tech industries of Silicon Valley.

Webinar

7/23/2009Cybersecurity: The Best Offense is a Good DefenseCybersecurity is an increasingly hot topic in Washington, DC. There is growing concern that government and businesses are vulnerable to attacks on physical infrastructure, such as the national electricity grid, and on virtual resources, such as government information systems or telecommunications networks. Compliance with data breach rules is more important than ever in the wake of the new HITECH Act.

As companies are continuously reviewing how they deliver services, whether business process or information technology functions, they are finding that across their various operating divisions and multiple geographies there is a hodge-podge of internal delivery, external delivery (outsourcing), and everything in-between.